An anonymous reader writes: Yik Yak has laid 60 percent of employees amid a downturn in the app’s growth prospects, The Verge has learned. The three-year-old anonymous social network has raised $73.5 million from top-tier investors on the promise that its young, college-age network of users could one day build a company to rival Facebook. But the challenge of growing its community while moving gradually away from anonymity has so far proven to be more than the company could muster. Employees who were affected were informed of the layoffs Thursday morning, sources told The Verge. Yik Yak employed about 50 people, and now only about 20 remain, the company said. The community, marketing, design, and product teams were all deeply affected, one source said. Atlanta-based Yik Yak was founded in 2014 by Furman University students Tyler Droll and Brooks Buffington. The app updated the concept of dorm newsletters for the mobile era, letting anyone post comments about school, their campus, or life in general. The fact that comments were anonymous initially helped the app grow, as it encouraged more candid forms of sharing than students might otherwise post on Facebook or Instagram.

coondoggie writes: “[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan ‘as-is’, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote.

An anonymous reader writes: For the first time in more than two decades, life expectancy for Americans declined last year — a troubling development linked to a panoply of worsening health problems in the United States. Rising fatalities from heart disease and stroke, diabetes, drug overdoses, accidents and other conditions caused the lower life expectancy revealed in a report released Thursday by the National Center for Health Statistics. In all, death rates rose for eight of the top 10 leading causes of death. The new report raises the possibility that major illnesses may be eroding prospects for an even wider group of Americans. Its findings show increases in “virtually every cause of death. It’s all ages,” said David Weir, director of the health and retirement study at the Institute for Social Research at the University of Michigan. Over the past five years, he noted, improvements in death rates were among the smallest of the past four decades. “There’s this just across-the-board [phenomenon] of not doing very well in the United States.” Overall, life expectancy fell by one-tenth of a year, from 78.9 in 2014 to 78.8 in 2015, according to the latest data. The last time U.S. life expectancy at birth declined was in 1993, when it dropped from 75.6 to 75.4, according to World Bank data. The overall death rate rose 1.2 percent in 2015, its first uptick since 1999. More than 2.7 million people died, about 45 percent of them from heart disease or cancer.

An anonymous reader writes: Some 2.7 million AT&T customers will share $88 million in compensation for having had unauthorized third-party charges added to their mobile bills, the Federal Trade Commission announced this morning. The latest shot in the federal government’s years-long battle against such abuses, these refunds will represent the most money ever recouped by victims of what is known as “mobile cramming,” according to the FTC. From an FTC press release: "Through the FTC’s refund program, nearly 2.5 million current AT&T customers will receive a credit on their bill within the next 75 days, and more than 300,000 former customers will receive a check. The average refund amount is $31. [...] According to the FTC’s complaint, AT&T placed unauthorized third-party charges on its customers’ phone bills, usually in amounts of $9.99 per month, for ringtones and text message subscriptions containing love tips, horoscopes, and 'fun facts.' The FTC alleged that AT&T kept at least 35 percent of the charges it imposed on its customers." The matter with AT&T was originally made public in 2014 and also involved two companies that actually applied the unauthorized charges, Tatto and Acquinity.

Flashpoint conducted the analysis of Floki Bot with Cisco’s Talos research team, and the two organizations said that the author behind the bot maintains a presence on a number of different underground forums, some of which are in Russian or other non-native languages for him. Kremez said that attackers sometimes will participate in foreign language forums as a way to expand their knowledge.

Along with its PoS infection capability, Floki Bot also has a feature that allows it to use the Tor network to communicate.

An anonymous reader writes: Today at Microsoft’s WinHEC event in Shenzhen, China, the company announced that it’s working with Qualcomm to bring the full Windows 10 experience to future devices powered by Snapdragon processors. These new Snapdragon-powered devices should support all things Microsoft, including Microsoft Office, Windows Hello, Windows Pen, and the Edge browser, alongside third-party Universal Windows Platform (UWP) apps and, most interestingly, x86 (32-bit) Win32 apps. They should even be able to play Crysis 2. This announcement fits nicely with Microsoft’s “Windows Everywhere” doctrine and should come as no surprise. It’s not even the first time we’ve seen Windows running on ARM processors. Microsoft’s failed Windows RT operating system was a modified version of Windows 8 that targeted the ARMv7-A 32-bit architecture. It grew from Microsoft’s MinWin effort to make Windows more modular by reorganizing the operating system and cleaning up API dependencies. The major change with today's announcement over Windows RT and UWP is that x86 apps will be able to run on Qualcomm's ARM-based SoCs, along with support for all of the peripherals that are already supported with Windows 10. This alone is a huge change from Windows RT, which would only work with a small subset of peripherals. Microsoft is also focusing on having these devices always connected through cellular, which is something that is not available for many PCs at the moment. Support will be available for eSIM to avoid having to find room in a cramped design to accommodate a physical SIM, and Microsoft is going so far as to call these "cellular PCs" meaning they are expecting broad support for this class of computer, rather than the handful available now with cellular connectivity. The ability to run x86 Win32 apps on ARM will come through emulation, and to demonstrate the performance Microsoft has released a video of an ARM PC running Photoshop.

More detailed studies would be required to actually confirm the link between C-sections and evolution, as all we have now is a hypothesis based on the birth data.

Agreed, more studies required part. Cesareans may simply be becoming more common with “too large” defined as cesarean seems like a better idea. It's reasonable to pose the question based simply on an understanding of evolution. Like it's reasonable to conjecture that length of human pregnancy is a compromise between further development in utero, and chance of mother and baby surviving the delivery.

BrianFagioli writes: Today, the Bluetooth Special Interest Group announces the official adoption of the previously-announced Bluetooth 5. In other words, it is officially the next major version of the technology, which will eventually be found in many consumer devices.

So, will you start to see Bluetooth 5 devices and dongles with faster speeds and longer range in stores tomorrow? Nope — sorry, folks. Consumers will have to wait until 2017. The Bluetooth SIG says devices should become available between February and June next year.

An anonymous reader writes: In early November of 2014, Twitter user @livebeef submitted a Freedom of Information Act (FOIA) request to the FBI concerning its investigation into Gamergate. In December of 2016, he finally received his information. It reveals that the FBI began investigating Gamergate very early on and has since closed the investigation, stating, “To date, all available investigative steps failed to identify any subjects or actionable leads.” The heavily redacted 169-page PDF files contain some of the threatening letters sent to Utah State University. Another event detailed an FBI visit to the home of a man whose name was involved in a threatening email. This is most likely YouTube user MrRepzion. Further on, the report details correspondence with one of the victims of the threats, repeatedly cautioning her against taking matters to the media. "I am attempting to collect the evidence for your case that would be useful in prosecution of any subject (once a subject is identified) and it is very difficult to do this when people know about the FBI involved and their need for use of Thor and other Proxies. [sic]”

AmiMoJo writes: An Oregon District Court has sided with a wrongfully accused man, who was sued for allegedly downloading a pirated copy of the Adam Sandler movie The Cobbler. According to the court's recommendations, the man is entitled to more than $17,000 in compensation as the result of the filmmakers "overaggressive" and "unreasonable" tactics. The defendant in question, Thomas Gonzales, operates an adult foster care home where several people had access to the Internet. The filmmakers were aware of this and during a hearing their counsel admitted that any guest could have downloaded the film.

Layzej writes: It is easy for a non-expert to be swayed by a credible sounding narrative that claims to overthrow a scientific consensus. For a scientist it is generally clear which arguments are valid, but the general public can’t independently evaluate scientific evidence. Scientist Victor Venema provides answers to a number of concerns about climate science raised by cartoonist Scott Adams. His answers are accessible and illuminating, and hopefully helpful to the non-expert who would like to understand the truth behind certain contrarian talking points.

An anonymous reader writes: For the past two months, a new exploit kit has been serving malicious code hidden in the pixels of banner ads via a malvertising campaign that has been active on several high profile websites. Discovered by security researchers from ESET, this new exploit kit is named Stegano, from the word steganography, which is a technique of hiding content inside other files. In this particular scenario, malvertising campaign operators hid malicious code inside PNG images used for banner ads. The crooks took a PNG image and altered the transparency value of several pixels. They then packed the modified image as an ad, for which they bought ad displays on several high-profile websites. Since a large number of advertising networks allow advertisers to deliver JavaScript code with their ads, the crooks also included JS code that would parse the image, extract the pixel transparency values, and using a mathematical formula, convert those values into a character. Since images have millions of pixels, crooks had all the space they needed to pack malicious code inside a PNG photo. When extracted, this malicious code would redirect the user to an intermediary ULR, called gate, where the host server would filter users. This server would only accept connections from Internet Explorer users. The reason is that the gate would exploit the CVE-2016-0162 vulnerability that allowed the crooks to determine if the connection came from a real user or a reverse analysis system employed by security researchers. Additionally, this IE exploit also allowed the gate server to detect the presence of antivirus software. In this case, the server would drop the connection just to avoid exposing its infrastructure and trigger a warning that would alert both the user and the security firm. If the gate server deemed the target valuable, then it would redirect the user to the final stage, which was the exploit kit itself, hosted on another URL. The Stegano exploit kit would use three Adobe Flash vulnerabilities (CVE-2015-8651, CVE-2016-1019 or CVE-2016-4117) to attack the user's PC, and forcibly download and launch into execution various strains of malware.

Dave Knott writes: Amazon just unveiled a grocery store without lines or checkout counters. Amazon Go, a 1800-square-foot retail space located in the company’s hometown of Seattle, lets shoppers just grab the items they want and leave; the order gets charged to their Amazon account afterwards. Amazon Go works by using computer vision and sensors to detect what items you’re taking out of the store. You start by scanning an app as you enter the Amazon Go shop. You do your normal shopping, and the sensors throughout the store identify the items in your cart and charge them to your account when you walk out the door. It’ll feel like shoplifting, except you’re actually being watched by more cameras than you can imagine. Though Amazon Go does do away with human cashiers, we haven’t seen anything about robots physically stocking the store, so while it does eliminate some jobs, it’s not a completely automated system... at least, not yet.

An anonymous reader writes: Scientists have developed a mind-controlled robotic hand that allows people with certain types of spinal injuries to perform everyday tasks such as using a fork or drinking from a cup. The low-cost device was tested in Spain on six people with quadriplegia affecting their ability to grasp or manipulate objects. By wearing a cap that measures electric brain activity and eye movement the users were able to send signals to a tablet computer that controlled the glove-like device attached to their hand. Participants in the small-scale study were able to perform daily activities better with the robotic hand than without, according to results published Tuesday in the journal Science Robotics. It took participants just 10 minutes to learn how to use the system before they were able to carry out tasks such as picking up potato chips or signing a document. According to Surjo R. Soekadar, a neuroscientist at the University Hospital Tuebingen in Germany and lead author of the study, participants represented typical people with high spinal cord injuries, meaning they were able to move their shoulders but not their fingers. There were some limitations to the system, though. Users had to have sufficient function in their shoulder and arm to reach out with the robotic hand. And mounting the system required another person's help.

schwit1 writes: THERE are many reasons why you might have been stopped at an American transport hub and your bag searched by officials. You might have be chosen at random. Perhaps you matched a profile. Or you could have been flagged by an airline, railroad or security employee who was being secretly paid by the government as a confidential informant to uncover evidence of drug smuggling.

A committee of Congress heard remarkable testimony last week about a long-running programme by the Drug Enforcement Administration. For years, officials from the Department of Justice testified, the DEA has paid millions of dollars to a variety of confidential sources to provide tips on travellers who may be transporting drugs or large sums of money. Those sources include staff at airlines, Amtrak, parcel services and even the Transportation Safety Administration.

The testimony follows a report by the Justice Department that uncovered the DEA programme and detailed its many potential violations. According to that report, airline employees and other informers had an incentive to search more travellers' bags, since they received payment whenever their actions resulted in DEA seizures of cash or contraband. The best-compensated of these appears to have been a parcel company employee who received more than $1m from the DEA over five years. One airline worker, meanwhile, received $617,676 from 2012 to 2015 for tips that led to confiscations. But the DEA itself profited much more from the programme. That well-paid informant got only about 12% of the amount the agency seized as a result of the his tips.